Advanced Fuzzy Class-Based Routing in MPLS-TE Networks

Size: px
Start display at page:

Download "Advanced Fuzzy Class-Based Routing in MPLS-TE Networks"

Transcription

1 Advanced Fuzzy Class-Based Routing in MPLS-TE Networks MICHAL PIŠTEK, MARTIN MEDVECKÝ Institute of Telecommunications Faculty of Electrical Engineering and Information Technology, Slovak University of Technology in Bratislava Ilkovičova, 8 9 Bratislava SLOVAKIA michal.pistek@stuba.sk, martin.medvecky@stuba.sk Abstract: - The paper focuses on optimizing MPLS-TE networks using Constraint-Based Routing algorithm with implemented fuzzy logic. CBR includes routing algorithms that do not make routing decisions solely on the shortest path towards the destination but they can also base their decisions on various Quality of Service parameters or administrative needs. MPLS-TE networks can benefit from implementing such algorithms by utilizing less loaded paths or limiting the QoS parameters of the traffic to desired values. Implementing multiple constraints into algorithm can have issues with combining these constraints to make the decisions. Fuzzy logic represents an ideal tool for normalizing these constraints in [,] interval where the closer the constraint gets to, the better the path should be. The paper introduces a new CBR algorithm called Advanced Fuzzy Class Based Algorithm (AFCBA) which, besides setting the proper membership functions and cost calculations, deals with the tie break situations and what actions to take if no path satisfies the requirements of the traffic flows. Key-Words: - Constraint Based Routing, Fuzzy Logic, MPLS, QoS, AFCBA, WSP, SWP Introduction In recent years, the exponential growth of traffic demand in communication networks has forced the telecommunication operators to seek the ways to maximize the performance of their networks without expanding the capacity of the links where it is possible. But implementing such mechanisms should always account for guaranteeing necessary performance values represented by Quality of Service (QoS) parameters. Multiprotocol label switching (MPLS) and Constraint-based routing (CBR) provide great symbiotic mechanisms which can optimize network performance without degrading the desired QoS parameters such as delay, jitter or loss rate. [] MPLS with implemented traffic engineering mechanisms (MPLS-TE) is a key network technology in nowadays core networks. MPLS-TE provides connection-oriented approach in IP networks. It creates end-to-end Label-switched paths (LSPs) where it can guarantee bandwidth and with the traffic engineering it can truly optimize the network s resources. It enables to use explicit routes which might not be ideal according to the routing algorithms but they enable to use network s resources more efficiently. MPLS-TE can also rely on the routing algorithms to build the LSPs. The third possibility is to use CBR algorithm to make the routing decision. Constraint-based routing (CBR) represents a class of routing algorithms that base path selection decisions on a set of requirements or constraints, in addition to the destination. These constraints may be imposed by administrative policies, or by QoS requirements. Constraints imposed by policies are referred to as policy constraints, and the associated routing is referred to as policy routing (or policybased routing). Constraints imposed by QoS requirements, such as bandwidth, delay, or loss, are referred to as QoS constraints, and the associated routing is referred to as QoS routing. [] The proposed CBR algorithm is a continuation of our previous work where we implemented fuzzy logic in our multi-constraint approach. The aim of the algorithm is to optimize the network s resources where it accounts for various requirements of various traffic classes. This way the highest priority traffic is most likely to use the shortest possible paths and the lowest priority traffic is routed through the underutilized paths in the network. The metrics in AFCBA are represented by their membership functions which, as defined by fuzzy E-ISSN: Volume 5, 6

2 logic, can range from to. This way we can treat them as equal and make the decision based on all the metrics at once. We use additional class-based metric weights to differentiate how much impact the particular constraint has on the particular traffic priority to make sure that the high priority classes are treated as best as possible whereas the lower priority classes use higher weights for the metrics which improve the overall network s utilization. The rest of the paper is structured as follows. The next chapter provides a brief survey of CBR algorithms. Then in chapter we present our algorithm with the proposed improvements. The chapter 4 consists of the simulation model and the simulation results. The chapter 5 then provides a conclusion of the article. Related Work Multiple CBR algorithms were proposed [][4]. The basic CBR algorithms are Widest Shortest Path (WSP) and Shortest Widest Path (SWP) [5]. SWP optimizes on the maximum available bottleneck bandwidth first and, if there are multiple such paths, selects among them the one with the least hop count. On the other hand WSP selects the path with maximum available bandwidth capacity of the bottleneck link among the paths having the least hop count. In [6] WSP was implemented with the metric of normalized hops. This metric normalizes the cost of the link based on the hop count. When the link advertizes its cost, the cost is relative to the costs of the other links. Another variation of WSP, TDWSP (Time-dependent WSP) tries to guess the future traffic demand and calculates the optimal paths based on these predictions. [7] Minimum Interference Routing Algorithm (MIRA) tries to route the new connection so that it interferes as little as possible with the possible future demands by calculating the critical links. The algorithm tries to choose the paths which do not contain critical links which are the links that can negatively affect one or more ingress-egress pairs. [8] Dynamic Online Routing Algorithm (DORA) is similar to MIRA but watches the number of the paths and not flows transmitting through the link. DORA defines n as the number of paths going through the particular link. The higher n is, the higher the probability of congestion is. Based on n value, DORA calculates the weights of the links, based on which it calculates the most optimal path. [9] In [], the new dynamic QoS routing algorithm was presented which is based on available bandwidth and delay. The algorithm has the following steps. Discard the path that has insufficient available bandwidth. Discard the path that does not meet the delay requirement. Discard the path that does not have available wavelength for every link of the path. Discard the path which is critical for the future traffic demands. Discard the path which has less available bandwidth. Profile Based Routing (PBR) algorithm is based on the pre-known classes of the flows, named as profiles. The approach is splitting the domain resources into the profiles between ingress-egress pairs known a priori, which constitutes the first phase of the algorithm. In the second phase, the flows are admitted one at a time based on their resource requests and the remaining capacity in the traffic class they map into. [] Fuzzy Routing Algorithm (FRA) applies fuzzy logic to combine the desired goals into one condition. The goals are maximizing maxflow, i.e., the capacity of the bottleneck link on the path, maximizing the residual bandwidth on the links other than the bottleneck link, and minimizing path length for its number of hops. It defines membership functions for these goals and combines them in the defined rule which finds the best compromised path. [] Advanced Fuzzy Class Based Algorithm The algorithm takes the same constraints and membership functions as it was proposed in [] but we add more depth to the algorithm to account for situations where multiple paths with the same cost are calculated or when no sufficient path exists when the traffic flows arrives. Advanced Fuzzy Class Based Algorithm (AFCBA) uses three metrics as its constraints and by implementing fuzzification on these constraints it can treat them as equal when the routing decision is made. The metrics that AFCBA uses are hop count, available bandwidth of bottleneck link and path utilization. The hop count is represented by a p membership function. = h + h () E-ISSN: Volume 5, 6

3 Here h represents the actual hop count of the particular path p. This function achieves the highest value (= ) when only one hop is between the ingress LER and the destination (meaning that ingress and egress LERs are directly connected without any LSRs between them). It decreases linearly up to the h max + value where h max represents maximum possible hop count. The available bandwidth of bottleneck link is represented by b p membership function. = () Value b represents actual available bandwidth of the particular path s bottleneck link. This function linearly rises up to the b max value which represents maximum possible available bandwidth of the links in the network. The algorithm always uses the link with the lowest available bandwidth of the particular path. The path utilization is represented by c p membership function., < = {, h () = { = (4), <, < < +, < <, > (5) = = (6) First the algorithm calculates the average utilization μ avg of all the links of the network and then assigns a value l μ to every link s utilization μ l based on the following function. Positive l μ value means that the link has lower than average utilization and the negative value means that its utilization is above average. For every path, the c p value is computed which achieves the highest value when all the links of the path have the utilization bellow the predefined minimum utilization value (μ min ). The final c p value is normalized in [, ] interval. The aim of c p value is to route the traffic through the underutilized paths in the network. For every constraint, we define the following metric weights: weight w,c for hop count, w,c for available bandwidth of bottleneck link and w,c for path utilization to take into consideration various needs of the traffic class c. The weight w,c should be set high for those traffic classes which require low delay values (e.g. voice). For such classes the weight w,c should be set low because it enables these classes to use short paths with lower available bandwidth of bottleneck link and on the other hand tries to limit the delay tolerant classes to use such paths. The weight w,c should be set high for those traffic classes which can tolerate higher delay values (e.g. web traffic) and so there is higher chance that the longer and underutilized path will be chosen for these classes so the shorter ones can be later used by delay intolerant classes and the utilization in network is better distributed. For better visualization we provide the membership functions a p and b p and the function l μ in Fig., and. As mentioned earlier, note that the higher the function s value is, the better the path seems. a p - b p l μ h max + Fig. : Membership function a p b max Fig. : Membership function b p Hop count (h) Available bandwidth (b) [bit/s] μ min μ avg μ max % Link utilization (μ l ) [%] Fig. : Function l μ representing normalized μ l.. Proposed Improvements We base the routing decision on the computed cost which combines the three constraints and thus provides the best compromise of these constraints. Note that the algorithm calculates this cost for every possible path in the network. The best path for the incoming flow is then represented by the highest E-ISSN: Volume 5, 6

4 yes yes WSEAS TRANSACTIONS on COMMUNICATIONS value. And consequentially the path (LSP) with this cost is chosen and explicitly established using CR-LDP protocol and the particular flow is mapped into this LSP. = max(,,,,, ) +, +, +, (7) one link that is currently used by highest priority class. If multiple such paths exist, AFCBA chooses the one with the most available bottleneck bandwidth so that the lower priority classes are influenced as little as possible. See Fig. 5 for the detailed flowchart of the functionality of AFCBA., < = {, < < (8), > Here, β parameter represents a number which is used as a representation of OR/AND logical operator in fuzzy logic OWA (Ordered Weighted Averaging) operation where the higher β is, the more it resembles OR. We define β as a function of the average link utilization (as calculated in (6)) so that AFCBA uses the left side of (7) equation when the network s utilization is low and the right side when the utilization rises (See Fig. 4). β Start Find all the possible paths All the paths are sufficient for the incoming flow? yes Calculate constraints ap, bp, cp no no Discard insufficient paths All the paths discarded? Based on traffic class and weights calculate costp Out of the original possible paths discard those that influence highest priority class μ μ Fig. 4: β as a function of μ avg % This way when the network is underutilized the traffic classes are routed through the path with the best constraint out of the three (a p, b p and c p ) and because predefined metric weights influence the traffic classes priority of the constraints, the path with the most suitable constraint of the particular traffic class is chosen. The more utilized the network becomes, the more compromised path, which accounts for all the constraints, is chosen. Because using only the left side of (7) can result in more paths with the same results, β is set to if such case occurs. If there are still multiple paths with the same result, the path is chosen based on the underlying shortest path first (SPF) algorithm. When the network is heavily loaded there can be situations where no path can fulfil the traffic flow s requirements. AFCBA does not function as an admission control mechanism so it still has to choose a path to route the traffic. Our aim in such situations is to choose the path which does not influence the highest priority traffic class so that it can be transmitted without loss and added delay and only lower priority classes will be influenced. So AFCBA discards all the paths which have at least μ avg Select the path Select the path no no Multiple paths with same costp? yes Recalculate costp with β= Multiple paths with same costp? yes Select the path based on SPF Multiple paths with the same available bandwidth? Select the path based on SPF Fig. 5: AFCBA s flowchart no Select the path with the most available bandwidth 4 Simulations The simulations were performed using Network Simulator (NS-). NS- is an open source discrete events simulator that is developed in C++ and OTcl. Its reliability for simulating MPLS was questioned in [4] where the real measurements of dealy values differed from the simulation results. Although we compare the algorithms also based on the delay values, these values are dependent mostly on the hop count of the particular path so the NS- s E-ISSN: Volume 5, 6

5 inaccuracy in this regard does not pose a problem for our simulations. The network topology (Fig. 6) consists of two Label Edge Routers (LER) and seven Label Switching Routers (LSR) forming fourteen possible paths between the traffic source and the traffic receivers which we list in Table for future referencing. These paths differ from each other in various link s bandwidth (from Mbit/s to 4 Mbit/s), which is indicated by the numbers on the links, and in the hop count (from to 5 hops). LER 4 LSR LSR LSR LSR LSR 5 LSR 6 LSR 7 Fig. 6: Simulation model 4 TABLE Possible Paths LER Web Video Path between LER and LER Path number LSR LSR4 LSR LSR LSR LSR 4 LSR LSR 5 LSR4 LSR7 6 LSR5 LSR4 7 LSR LSR LSR 8 LSR LSR LSR 9 LSR LSR LSR LSR5 LSR4 LSR7 LSR5 LSR6 LSR7 LSR4 LSR5 LSR6 LSR7 LSR5 LSR6 LSR7 LSR4 4 Voice Three different traffic classes were used in our simulations representing voice, video and web traffic, voice traffic having the highest priority and web traffic having the lowest one. We use constant bit rate generator for voice and video traffic and exponential generator for web traffic. Each traffic class is represented by three flows. See Table for arrival flows of the particular flows. TABLE Flows Arrival Times Traffic flow Start [s] Web Video Voice Web 4 Video 5 Voice 6 Web 7 Video 8 Voice 9 Note that the order is web flow then video flow and voice flow as the last. We use this order to make it the most difficult for highest priority voice flows to find a suitable path. But by using proper constraint weights, AFCBA should be able to find one. Note that for web traffic we use the highest weight for path utilization constraint so it could be routed through the underutilized paths. For voice traffic we use the highest weight for hop count constraint so it could be routed with the minimal delay. Video traffic has the same weight values for all the constraints. The used constraint weights are as following: w,voice =.5 w,voice =.67 w,voice =. w,video =. w,video =. w,video =. w,web =.67 w,web =. w,web =.5 The last tuning parameters represent utilization intervals where μ min and μ max are used for l μ represented in (5) and μ and μ are used for β represented in (8). μ min = % μ max = 9 % μ = 5 % μ = 4 % 4. Simulation In this scenario we performed simulations where for every arriving traffic flow, AFCBA is able to find a sufficient path. The bit rates for the arriving flows are as follows: Web flows: kbit/s Video flows: 5 kbit/s Voice flows: 5 kbit/s E-ISSN: Volume 5, 6

6 The path selection is based on (7) equation where β is dependent on average link utilization (μ avg ) computed in (6) so at the very beginning of the simulation when the first flow Web arrives, β =. Because all the bottleneck links have % utilization b p constraint has highest value (= ) for every path which causes that all the paths choose b p as the best metric but with the same value. When AFCBA detects multiple best paths it recomputes value with β = and all the constraints are used resulting in Path selection. See Table for values of paths from Web s point of view. Note that the original is equal to.5 because w,web =.5. TABLE The Values Of For Web Flow,9,8,7,6 c,5 p,4,,, Path # Original Recompute d Path.5.8 Path.5.8 Path.5.85 Path Path Path Path Path Path Path.5.7 Path.5.8 Path.5.9 Path.5.7 Path Path 6 Path 7 Path Path Path Path 4 Time [s] 4 5 Fig. 7: Values of c p membership function for path affected by Web s arrival After the selection of Path, its value is lowered because path utilization rises which lowers the c p value. As you can see in Fig. 7, selecting Path causes lower value for another 5 paths (7,,, and 4). Fig. 7 also shows that c p value decreases most for the paths which have the most links in common with the chosen Path. As you can see, the given paths were not chosen by any traffic flow until the 5 th second of simulation. Similar situation happens with Video and Voice flows arrivals. See Table 4 for the path selection of these flows. There are 8 paths with the same best value for Video flow so recomputation is needed which leaves the Path as the only best path. See Fig. 8 for the c p values of the affected paths. Fig. 8: Values of c p membership function for path affected by Video s arrival TABLE 4 The Values Of For Video And Voice Flows Path #,9,8,7,6 c,5 p,4,,, 4 5 Original Video Recomp. Video Original Voice Path Path 4 Path 5 Path 8 Path 9 Path Time [s] Recomp. Voice When Voice flow arrives there are only two paths with same values but in this case the recomputation does not help because both paths are E-ISSN: Volume 5, 6

7 identical from the point of view of all the constraints. Here the Path is selected as the result of the SPF algorithm. Note that AFCBA sets to paths with less than the best original so that they do not interfere with the original best paths. With more flows arriving, the average link utilization is rising and consequentially β is declining. This means that right side of (7) has higher and higher weight so the best compromised path is selected instead of a path where one constraint achieves very good value. See Fig. 9 for the actual average link utilization during the first seconds of the simulation and Table 5 for β values when the particular flow arrives. Avwerage link utilization [%] TABLE 5 The Average Link Utilization And The Corresponding Β Value For The Arriving Traffic Flows Traffic flow Average link utilization [%] β value Web Video 6.74 Voice Web.4.8 Video Voice.45. Web 9.99 Video Voice Time [s] Fig. 9: Average link utilization For the rest of the flows there was no need for recomputation so the values in Table 6 represent the original values. The values marked with * represent paths which achieved better value but are not selected because they cannot fulfill the arriving flow s requirements. TABLE 6 The Values Of For The Rest Of The Flows Path # Web Video Voice Web Video Voice *..9.55* * * *.9.5.7* * * * We compared AFCBA with WSP and SWP algorithms in terms of delay and jitter values. SWP firstly chooses based on the most available bottleneck bandwidth and if there are more such paths, SWP chooses the one with the least hops. WSP is similar but has the two steps changed so it firstly chooses based on the hops and then based on the available bottleneck bandwidth. See Fig. and for the results. Average delay [ms] Average jitter [ms] Voice Video Web Fig. : Average delay comparison Voice Video Web Fig. : Average jitter comparison AFCBA WSP SWP AFCBA WSP SWP As you can see, AFCBA achieved the best results for the highest priority voice traffic although its flows arrived as the last in each cycle. This is due to the fact that web traffic and also video traffic had lower weight of the hop count constraint so it could use the shorter paths whereas the lower the priority E-ISSN: Volume 5, 6

8 of the traffic the bigger the weight of the path utilization constraint was so the web traffic prioritized underutilized paths. 4. Simulation This scenario represents a situation when AFCBA is unable to select a suitable path for an incoming flow triggering the path selection which avoids the links that participate in transferring the high priority voice traffic. To achieve this situation we raise the bit rate of voice flows to 85 kbit/s so the bit rates of the traffic classes are as follows: Web flows: kbit/s Video flows: 5 kbit/s Voice flows: 85 kbit/s TABLE 7 The Average Link Utilization And The Corresponding Β Value For Arriving Traffic Flows In Scenario Traffic flow Average link utilization [%] β value Web Video 6.74 Voice Web.6.76 Video.5.7 Voice 6.4. Web 45.7 Video.6. Voice 44. The values of β depicted in Table 7 are fairly similar to Scenario I with slight changes after Voice flow arrives. The path selection is the same up to Video flow s path. See Table 8 for the path selection of the remaining flows. When Video flow arrives there is no path in the network that could fulfil its requirement of 5 kbit/s. AFCBA then looks for those path that do not interfere with high priority (voice) traffic (marked with green) and discards those that do interfere (marked with red). Then AFCBA does not compute but instead selects the path with the most available bottleneck bandwidth so it has the least impact on the existing traffic going through the selected path and the paths which have some of the links in the selected path. In this case there are three viable paths (Paths, and 9). Because Path has the most available bottleneck bandwidth ( kbit/s compared to 5 kbit/s of Paths and 9) it is chosen for the Video flow. Note that if more paths with the same available bottleneck bandwidth existed, SPF would be used to break the tie. TABLE 8 The Path Selection Based On And Available Bottleneck Bandwidth (ABB) Values For The Last Four Flows Path # Voice Web ABB [kbit/s] Video Voice As in Scenario I, we compare AFCBA with WSP and SWP. Because there were insufficient resources in the network for every algorithm, we compare them also based on the loss rate which also occurs in the scenario. See Fig. and for the results. Average delay [ms] Loss [%] Voice Video Web Fig. : Average delay comparison Voice Video Web Fig. : Loss comparison AFCBA WSP SWP AFCBA WSP SWP Because AFCBA avoids the paths which carry the voice traffic when the congestion occurs, the voice traffic achieved % loss rate and the loss increased with decreasing priority. WSP and SWP achieved the opposite results because they do not make such class-based decisions and because the voice traffic E-ISSN: Volume 5, 6

9 flows always arrived as the last in each cycle resulting in less optimal paths compared to web and video traffic. 5 Conclusion We proposed a new CBR algorithm called Advanced Fuzzy Class Based Algorithm (AFCBA). AFCBA defines three membership functions for the three constraints and then combines them to compute the one cost value to determine the best path. This computation is class-based thanks to the constraint weights which signify the importance of each constraint to the particular traffic class. In this paper, we focused on the situations where multiple paths achieve the same properties and the situations where no feasible path could be found by the algorithm. The first simulation stressed the situations where multiple paths achieved the same results and this forced AFCBA to recomputation resulting in the only one best path when any tie break happens. We compared AFCBA with WSP and SWP algorithms where our algorithm performed best in terms of delay and jitter values achieved by higher priority flows. As shown in the second simulation when congestion occurs, AFCBA protects high priority flows by avoiding the paths which would have impact on this traffic, resulting in % loss rate of voice traffic compared to.76 % and 5.7 % for WSP and SWP, respectively. The presented simulation results show that the network can benefit from implementing AFCBA where it optimizes the network utilization with the lower priority flows and prioritizes the higher priority flows when it is possible. 6 Acknowledgement This work is a part of research activities conducted at Slovak University of Technology Bratislava, Faculty of Electrical Engineering and Information Technology, Institute of Telecommunications, within the scope of the project Optimalization of resource utilization in MPLS networks as part of the Grant programme to support young researchers of STU. References: [] E. Chromy, M. Jadron, M. Kavacky and S. Klucik, Admission Control in IMS Networks, in Journal AEEE - Information and Communication Technologies and Services, Volume, Number 5,, Special Issue, pp. 7-79, E-ISSN 84-9, ISSN [] O. Younis and S. Fahmy, Constraint-Based Routing in the Internet: Basic Principles and Recent Research, in IEEE Communications Surveys and Tutorials, pp. -. ISSN: X,. [] A. Karaman, Constraint-Based Routing in Traffic Engineering, in Proceedings of the IEEE International Symposium on Computer Networks (ISCN '6), pp. 6, Istanbul, Turkey, 6. [4] T.C. Hung, N.H. Thanh, N.D. Thang, H.W. Jung, T.Kim, S.H. Kim and W.J.Yang, Advanced Routing Algorithms and Load Balancing on MPLS, in Proceedings of the 9th International Conference on Advanced Communication Technology (ICACT '7), vol., pp , Gangwon-Do, Republic of Korea, February 7. [5] Q. Ma and P. Steenkiste, On Path Selection for Traffic with Bandwidth Guarantees, in Proceedings of IEEE International Conference on Network Protocols, pp. 9-, October 997. [6] A.F. Khalifeh and A.H. El-Mousa, QoS Routing of VoIP using a Modified Widest- Shortest Routing Algorithm, In IEEE/ACS International Conference on Computer Systems and Applications, 7 (AICCSA '7), May 7. pp ISBN: [7] Y. Yang and C. Lung, The role of traffic forecasting in QoS routing - a case study of time-dependent routing, In IEEE International Conference on Communications (ICC 5), vol., May 5. pp ISBN: [8] M.S. Kodialam and T.V. Lakshman, Minimum Interference Routing with Applications to MPLS Traffic Engineering, In INFOCOM (),, pp [9] T.C. Hung, N.H. Thanh, N.D. Thang, H.W. Jung, T. Kim, S.H. Kim and W.J. Yang, Advanced Routing Algorithms and Load Balancing on MPLS, In: Proc. 9th ICACT, February 7, vol.. pp ISSN: [] S. Kulkarni, R. Sharma, P. Sharan and R.B.R. Gowd, New Dynamic QoS Routing Algorithm for Optical Networks Based on MPLS With Delay And Bandwidth as Constraints, In International Conference on Optical Engineering (ICOE), Belgaum, July. pp. -6. ISBN: E-ISSN: Volume 5, 6

10 [] A. Karaman, Constraint-Based Routing in Traffic Engineering, In ISCN: IEEE, 6, pp [] J.A. Khan and H.M. Alnuweiri, A Fuzzy Constraint-Based Routing Algorithm for Traffic Engineering, IEEE/Globecom, Dallas, USA, 4. [] M. Pištek and M. Medvecký, Class-Based Constraint-Based Routing with Implemented Fuzzy Logic in MPLS-TE Networks, Journal of Computer Networks and Communications, vol. 4, Article ID 78, 7 pages, 4. doi:.55/4/78. [4] H. Coll, J. Lloret and F.J. Sanchez, Does ns really simulate MPLS networks?, The Fourth International Conference on Autonomic and Autonomous Systems (ICAS 8), Gosier, Guadeloupe. March 6-, 8. E-ISSN: Volume 5, 6

THE EFFICIENCY OF CONSTRAINT BASED ROUTING IN MPLS NETWORKS

THE EFFICIENCY OF CONSTRAINT BASED ROUTING IN MPLS NETWORKS VOLUME: 9 NUMBER: 5 SPECIAL ISSUE THE EFFICIENCY OF CONSTRAINT BASED ROUTING IN MPLS NETWORKS Martin MEDVECKY Department of Telecommunications, Faculty of Electrical Engineering and Information Technology,

More information

Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering

Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering GET/ENST Bretagne - Département Réseaux et Services Multimédia 2 rue de la Châtaigneraie - CS 1767-35576

More information

Evaluation of Performance for Optimized Routing in MPLS Network

Evaluation of Performance for Optimized Routing in MPLS Network Evaluation of Performance for Optimized Routing in MPLS Network Neethu T U Student,Dept. of Electronics and Communication The Oxford College of Engineering Bangalore, India Reema Sharma Assistant Professor,Dept.of

More information

Low complexity bandwidth guaranteed routing algorithms using path holding time

Low complexity bandwidth guaranteed routing algorithms using path holding time Low complexity bandwidth guaranteed routing algorithms using path holding time Cao Thai Phuong Thanh Saigon University Ho Chi Minh City, Vietnam Email: ctpthanh@sgu.edu.vn Ha Hai Nam, Tran Cong Hung Post

More information

Syed Mehar Ali Shah 1 and Bhaskar Reddy Muvva Vijay 2* 1-

Syed Mehar Ali Shah 1 and Bhaskar Reddy Muvva Vijay 2* 1- International Journal of Basic and Applied Sciences Vol. 3. No. 4 2014. Pp. 163-169 Copyright by CRDEEP. All Rights Reserved. Full Length Research Paper Improving Quality of Service in Multimedia Applications

More information

An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation

An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation Telecommunication Systems 19:3,4, 481 495, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation GAEIL

More information

Performance Evaluation of IPv4 and IPv6 over MPLS using OPNET

Performance Evaluation of IPv4 and IPv6 over MPLS using OPNET Performance Evaluation of IPv4 and IPv6 over MPLS using OPNET Suhail Ahmad Wajid Ali Hamdani Mohsin Hassan Magray ABSTRACT Over the last two decades, we have witnessed a rapid deployment of real-time applications

More information

Analyze of SIP Messages and Proposal of SIP Routing

Analyze of SIP Messages and Proposal of SIP Routing Analyze of SIP Messages and Proposal of SIP Routing F. Csoka, I. Baronak, E. Chromy and L. Kockovic Abstract This paper deals with the functionality of SIP and design of an efficient and optimized process

More information

LSP Setup Arrival Reordering Approach for MPLS-TE Routing

LSP Setup Arrival Reordering Approach for MPLS-TE Routing LSP Setup Arrival Reordering Approach for MPLS-TE Routing Imène Chaieb and Jean-Louis Le Roux France Telecom R&D, Lannion 37, France Email: {imene.chaieb, jeanlouis.leroux}@orange-ftgroup.com Bernard Cousin

More information

A Novel Traffic Engineering Routing Algorithm

A Novel Traffic Engineering Routing Algorithm A Novel Traffic Engineering Routing Algorithm Cao Thai Phuong Thanh 1, Ha Hai Nam 2, and Tran Cong Hung2 1 Saigon University, Vietnam ctpthanh@sgu.edu.vn 2 Post & Telecommunications Institute of Technology,

More information

Selection of Defuzzification method for routing metrics in MPLS network to obtain better crisp values for link optimization

Selection of Defuzzification method for routing metrics in MPLS network to obtain better crisp values for link optimization Selection of Defuzzification method for routing metrics in MPLS network to obtain better crisp values for link optimization ARIANIT MARAJ, BESNIK SHATRI, SKENDER RUGOVA Telecommunication Department Post

More information

Minimum Interference Routing of Bandwidth Guaranteed Tunnels with MPLS Traffic Engineering Applications

Minimum Interference Routing of Bandwidth Guaranteed Tunnels with MPLS Traffic Engineering Applications 2566 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 12, DECEMBER 2000 Minimum Interference Routing of Bandwidth Guaranteed Tunnels with MPLS Traffic Engineering Applications Koushik Kar,

More information

Network Protection Design for MPLS Networks

Network Protection Design for MPLS Networks Network Protection Design for MPLS Networks Gaurav Agrawal, Dijiang Huang, Deep Medhi Computer Science and Electrical Engineering Department University of Missouri-Kansas City, MO 64110, USA Computer Science

More information

Source Routing Algorithms for Networks with Advance Reservations

Source Routing Algorithms for Networks with Advance Reservations Source Routing Algorithms for Networks with Advance Reservations Lars-Olof Burchard Communication and Operating Systems Technische Universitaet Berlin ISSN 1436-9915 No. 2003-3 February, 2003 Abstract

More information

Simulation of Energy Efficiency in Virtual Topology

Simulation of Energy Efficiency in Virtual Topology Simulation of Energy Efficiency in Virtual Topology 1 Nanda Kumar. S, 2 Selva Ra. P Department. of Information Technology, SRM University, Chennai, India 1 nanda6488@gmail.com, 2 selvara.p@ktr.srmuniv.ac.in

More information

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006 Master s Thesis Title Cross-Layer Traffic Engineering in IP over WDM Networks Supervisor Professor Masayuki Murata Author Yuki Koizumi February 15th, 2006 Graduate School of Information Science and Technology

More information

DIFFSERV BASED QOS PERFORMANCE STUDY OF VIDEO CONFERENCING APPLICATION USING TRADITIONAL IP AND MPLS-TE NETWORKS OVER IPV4 AND IPV6

DIFFSERV BASED QOS PERFORMANCE STUDY OF VIDEO CONFERENCING APPLICATION USING TRADITIONAL IP AND MPLS-TE NETWORKS OVER IPV4 AND IPV6 DOI: http://dx.doi.org/10.26483/ijarcs.v8i7.4289 Volume 8, No. 7, July August 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN

More information

Research Article Average Bandwidth Allocation Model of WFQ

Research Article Average Bandwidth Allocation Model of WFQ Modelling and Simulation in Engineering Volume 2012, Article ID 301012, 7 pages doi:10.1155/2012/301012 Research Article Average Bandwidth Allocation Model of WFQ TomášBaloghandMartinMedvecký Institute

More information

Contribution to the Management of Traffic in Networks

Contribution to the Management of Traffic in Networks Contribution to the Management of Traffic in Networks Filip CHAMRAZ, Ivan BARONAK Institute of Telecommunications, Faculty of Electrical Engineering and Information Technology, Slovak University of Technology,

More information

Routing and Traffic Engineering in Hybrid RF/FSO Networks*

Routing and Traffic Engineering in Hybrid RF/FSO Networks* Routing and Traffic Engineering in Hybrid RF/FSO Networks* Abhishek Kashyap and Mark Shayman Department of Electrical and Computer Engineering, University of Maryland, College Park MD 20742 Email: {kashyap,

More information

Outline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006

Outline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modelling Yong Liu 09/19/2006 1 Outline Examples Basic Problems Routing Restriction 2 1 Example: Intra-Domain Traffic Engineering

More information

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL I.J.E.M.S., VOL.2 (4) 2011: 221-228 ISSN 2229-600X PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL Jai Kumar, Jaiswal Umesh Chandra Department of Computer Science

More information

M_CSPF: A Scalable CSPF Routing Scheme with Multiple QoS Constraints for MPLS Traffic Engineering

M_CSPF: A Scalable CSPF Routing Scheme with Multiple QoS Constraints for MPLS Traffic Engineering M_CSPF: A Scalable CSPF Routing Scheme with Multiple QoS Constraints for MPLS Traffic Engineering Daniel W. Hong, Choong Seon Hong, and Gil-Haeng Lee In the context of multi-protocol label switching (MPLS)

More information

Progress Report No. 3. A Case Study on Simulation Scenario

Progress Report No. 3. A Case Study on Simulation Scenario NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 3 A Case Study on Simulation Scenario The University of Canterbury Team 21 December 2005 Progress Report This report

More information

Internetworking with Different QoS Mechanism Environments

Internetworking with Different QoS Mechanism Environments Internetworking with Different QoS Mechanism Environments ERICA BUSSIKI FIGUEIREDO, PAULO ROBERTO GUARDIEIRO Laboratory of Computer Networks, Faculty of Electrical Engineering Federal University of Uberlândia

More information

Multicast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM

Multicast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM Multicast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM Jeong-Mi Kim 1, Oh-Han Kang 2, Jae-Il Jung 3, and Sung-Un Kim 1,4 1 Pukyong National University, 599-1 Daeyeon 3-Dong Nam-Gu, Busan,

More information

MPLS OAM Technology White Paper

MPLS OAM Technology White Paper MPLS OAM Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without

More information

Converged Networks. Objectives. References

Converged Networks. Objectives. References Converged Networks Professor Richard Harris Objectives You will be able to: Discuss what is meant by convergence in the context of current telecommunications terminology Provide a network architecture

More information

Multi-Protocol Label Switching

Multi-Protocol Label Switching Rheinisch-Westfälische Technische Hochschule Aachen Lehrstuhl für Informatik IV Prof. Dr. rer. nat. Otto Spaniol Multi-Protocol Label Switching Seminar: Datenkommunikation und Verteilte Systeme SS 2003

More information

Optimization of Network Redundant Technologies Collaboration in IMS Carrier Topology

Optimization of Network Redundant Technologies Collaboration in IMS Carrier Topology Optimization of Network Redundant Technologies Collaboration in IMS Carrier Topology Filip Burda, Peter Havrila, Marián Knězek, Klaudia Konôpková, Ivan Kotuliak, Ján Murányi, and Juraj Nemeček Slovak University

More information

A QoS Control Method Cooperating with a Dynamic Load Balancing Mechanism

A QoS Control Method Cooperating with a Dynamic Load Balancing Mechanism A QoS Control Method Cooperating with a Dynamic Load Balancing Mechanism Akiko Okamura, Koji Nakamichi, Hitoshi Yamada and Akira Chugo Fujitsu Laboratories Ltd. 4-1-1, Kamikodanaka, Nakahara, Kawasaki,

More information

Simulation and Analysis of Impact of Buffering of Voice Calls in Integrated Voice and Data Communication System

Simulation and Analysis of Impact of Buffering of Voice Calls in Integrated Voice and Data Communication System Simulation and Analysis of Impact of Buffering of Voice Calls in Integrated Voice and Data Communication System VM Chavan 1, MM Kuber 2 & RJ Mukhedkar 3 1&2 Department of Computer Engineering, Defence

More information

Improving the usage of Network Resources using MPLS Traffic Engineering (TE)

Improving the usage of Network Resources using MPLS Traffic Engineering (TE) International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Improving

More information

Probability Admission Control in Class-based Video-on-Demand System

Probability Admission Control in Class-based Video-on-Demand System Probability Admission Control in Class-based Video-on-Demand System Sami Alwakeel and Agung Prasetijo Department of Computer Engineering College of Computer and Information Sciences, King Saud University

More information

Towards an Adaptive and Intelligent MPLS Network

Towards an Adaptive and Intelligent MPLS Network Towards an Adaptive and Intelligent MPLS Network Rana Rahim-Amoud, Leila Merghem-Boulahia, and Dominique Gaiti ISTIT, University of Technology of Troyes 12, rue Marie Curie, BP 2060, 10 010 TROYES CEDEX,

More information

Improved MPLS-TE LSP Path Computation using Preemption

Improved MPLS-TE LSP Path Computation using Preemption Improved MPLS-TE LSP Path Computation using Preemption Imène Chaieb and Jean-Louis Le Roux France Telecom R&D, 2 Avenue Pierre Marzin Lannion 22307, France Email: {imene.chaieb, jeanlouis.leroux}@orange-ftgroup.com

More information

New Principle in Admission Control Realisation

New Principle in Admission Control Realisation New Principle in Admission Control Realisation ERIK CHROMY, MAREK HOLIENCIN, IVAN BARONAK Slovak University of Technology in Bratislava Faculty of Electrical Engineering and Information Technology Ilkovicova

More information

Improve the QoS by Applying Differentiated Service over MPLS Network

Improve the QoS by Applying Differentiated Service over MPLS Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,

More information

6 MPLS Model User Guide

6 MPLS Model User Guide 6 MPLS Model User Guide Multi-Protocol Label Switching (MPLS) is a multi-layer switching technology that uses labels to determine how packets are forwarded through a network. The first part of this document

More information

On-Line Routing in WDM-TDM Switched Optical Mesh Networks

On-Line Routing in WDM-TDM Switched Optical Mesh Networks On-Line Routing in WDM-TDM Switched Optical Mesh Networks Arun Vishwanath and Weifa Liang Department of Computer Science The Australian National University Canberra, ACT-0200, Australia Email: {arunv,wliang}@cs.anu.edu.au

More information

Advanced Telecommunications

Advanced Telecommunications ternet Routing - MPLS By Richard Harris MPLS Presentation line troduction Problems of ternet size Methods for overcoming potential problems What is MPLS? Overview MPLS terminology MPLS Architecture The

More information

Performance Analysis of Frame Relay Network Using OSPF (Open Shortest Path First) and MPLS (Multi-Protocol Label Switching) based on GNS3

Performance Analysis of Frame Relay Network Using OSPF (Open Shortest Path First) and MPLS (Multi-Protocol Label Switching) based on GNS3 Int. Journal of Applied IT Vol. 01 No. 02 (2017) International Journal of Applied Information Technology http://journals.telkomuniversity.ac.id/ijait Performance Analysis of Frame Relay Network Using OSPF

More information

On the Scalability-Performance Tradeoffs in MPLS and IP Routing

On the Scalability-Performance Tradeoffs in MPLS and IP Routing Boston University OpenBU Computer Science http://open.bu.edu CAS: Computer Science: Technical Reports 22 On the Scalability-Performance Tradeoffs in MPLS and IP Routing Yilmaz, Selma Boston University

More information

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54 MPLS Technology Overview Ahmed Benallegue A.Benallegue@ecmwf.int RMDCN workshop on the migration to IP/VPN 1/54 Plan 1. MPLS basics 2. The MPLS approach 3. Label distribution RSVP-TE 4. Traffic Engineering

More information

Telematics Chapter 7: MPLS

Telematics Chapter 7: MPLS Telematics Chapter 7: MPLS User watching video clip Beispielbild Application Layer Presentation Layer Session Layer Transport Layer Server with video clips Application Layer Presentation Layer Session

More information

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK I.J.E.M.S., VOL.2 (3) 211: 163-171 ISSN 2229-6X PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION Jai Kumar and U.C. Jaiswal Department of Computer Science and Engineering, Madan

More information

Modelling direct application to network bandwidth provisioning for high demanding research applications

Modelling direct application to network bandwidth provisioning for high demanding research applications Modelling direct application to network bandwidth provisioning for high demanding research applications H. Wessing, Y. Yan and M. Berger Research Center COM Technical University of Denmark Bldg. 345V,

More information

Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module

Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module Quality of Service Monitoring and Delivery Part 01 ICT Technical Update Module Presentation Outline Introduction to IP-QoS IntServ Architecture DiffServ Architecture Post Graduate Certificate in Professional

More information

Modeling of Contact Center Traffic

Modeling of Contact Center Traffic Modeling of Contact Center Traffic E. Chromy, S. Petran and M. Kavacky * Abstract Paper deals with operation of the contact center and its modeling. Erlang B and Erlang C formulas are used for our calculations.

More information

Connectivity Aware Routing a Method for Finding Bandwidth Constrained Paths Over a Variety of Network Topologies

Connectivity Aware Routing a Method for Finding Bandwidth Constrained Paths Over a Variety of Network Topologies Connectivity Aware Routing a Method for Finding Bandwidth Constrained Paths Over a Variety of Network Topologies Karol Kowalik and Martin Collier Research Institute for Networks and Communications Engineering

More information

Presentation Outline. Evolution of QoS Architectures. Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module

Presentation Outline. Evolution of QoS Architectures. Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module Quality of Service Monitoring and Delivery Part 01 ICT Technical Update Module Presentation Outline Introduction to IP-QoS IntServ Architecture DiffServ Architecture Post Graduate Certificate in Professional

More information

Deploying MPLS & DiffServ

Deploying MPLS & DiffServ Deploying MPLS & DiffServ Thomas Telkamp Director, Data Architecture & Technology Global Crossing Telecommunications, Inc. telkamp@gblx.net MPLS and DiffServ technologies are getting a lot of attention

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

QoS Online Routing and MPLS Multilevel Protection: A Survey

QoS Online Routing and MPLS Multilevel Protection: A Survey ACCEPTED FROM OPEN CALL QoS Online Routing and MPLS Multilevel Protection: A Survey Jose L. Marzo and Eusebi Calle, Universitat de Girona Caterina Scoglio and Tricha Anjali, Georgia Institute of Technology

More information

MMPLS: Modified Multi Protocol Label Switching

MMPLS: Modified Multi Protocol Label Switching MMPLS: Modified Multi Protocol Label Switching Kanupriya 1 and Vikas Nandal 2 1 Electronics and Communication Department, U.I.E.T, MDU Rohtak, Haryana (India) priya.kanu846@gmail.com 2 Electronics and

More information

PERFORMANCE ANALYSIS OF VIDEO ON DEMAND AND VIDEO STREAMING ON THE NETWORK MPLS TRAFFIC ENGINEERING

PERFORMANCE ANALYSIS OF VIDEO ON DEMAND AND VIDEO STREAMING ON THE NETWORK MPLS TRAFFIC ENGINEERING ISSN: 2186-2982 (P), 2186-2990 (O), Japan, DOI: https://doi.org/10.21660/2018.50. IJCST33 Special Issue on Science, Engineering & Environment PERFORMANCE ANALYSIS OF VIDEO ON DEMAND AND VIDEO STREAMING

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

Feedback Mechanism Validation and Path Query. Messages in Label Distribution Protocol

Feedback Mechanism Validation and Path Query. Messages in Label Distribution Protocol Feedback Mechanism Validation and Path Query Messages in Label Distribution Protocol Ahmed Gario A Thesis in The Department of Computer Science Presented in partial Fulfillment of the Requirements For

More information

Differentiation of Services in IMS over MPLS Network Core

Differentiation of Services in IMS over MPLS Network Core Differentiation of Services in IMS over MPLS Network Core Filip BURDA, Peter HAVRILA, Marián KNĚZEK, Klaudia KONÔPKOVÁ, Juraj NEMEČEK, Ján MURÁNYI* Slovak University of Technology Faculty of Informatics

More information

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please

More information

SYSC 5801 Protection and Restoration

SYSC 5801 Protection and Restoration SYSC 5801 Protection and Restoration Introduction Fact: Networks fail. Types of failures: Link failures Node failures Results: packet losses, waste of resources, and higher delay. What IGP does in the

More information

Session 2: MPLS Traffic Engineering and Constraint-Based Routing (CR)

Session 2: MPLS Traffic Engineering and Constraint-Based Routing (CR) MPLS Frame Relay Alliance formed in April 2003 Session 2: MPLS Traffic Engineering and Constraint-Based Routing (CR) Copyright 2003 MPLS Frame Relay Alliance Slide 2-12 MPLS Routing h The need for Traffic

More information

Traffic Behaviour of VoIP in a Simulated Access Network

Traffic Behaviour of VoIP in a Simulated Access Network Complete Citation: Das Gupta, Jishu and Howard, Srecko and Howard, Angela (2006). Traffic behaviour of VoIP in a simulated access network. International Transactions on Engineering, Computing and Technology,

More information

Protection Switching and Rerouting in MPLS

Protection Switching and Rerouting in MPLS Protection Switching and Rerouting in MPLS S. Veni Dr.G.M.Kadhar Nawaz Research Scholar, Director, Dept. of MCA Bharathiar University Sona College of Technology Coimbatore, India Salem, India venii_k@yahoo.com

More information

Performance Evaluation of MPLS TE Signal Protocols with Different Audio Codecs for Voice Application

Performance Evaluation of MPLS TE Signal Protocols with Different Audio Codecs for Voice Application Performance Evaluation of MPLS TE Signal Protocols with Different Audio Codecs for Voice Application Sarmad K. Ibrahim Computer Engineering Department, Nahrain University Baghdad, Iraq Mahmoud M. AL-Quzwini

More information

Journal of Electronics and Communication Engineering & Technology (JECET)

Journal of Electronics and Communication Engineering & Technology (JECET) Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X

More information

Performance Study of a QoS scheduling algorithm over wireless networks

Performance Study of a QoS scheduling algorithm over wireless networks 1 Performance Study of a QoS scheduling algorithm over wireless networks Siew HuiPei Joanna, Student Member, IEEE Abstract With the proliferation of wireless networks, consumers are increasingly aware

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 34 This chapter describes how to use different methods to configure quality of service (QoS) on the Catalyst 3750 Metro switch. With QoS, you can provide preferential treatment to certain types

More information

A MPLS Simulation for Use in Design Networking for Multi Site Businesses

A MPLS Simulation for Use in Design Networking for Multi Site Businesses A MPLS Simulation for Use in Design Networking for Multi Site Businesses Petac Eugen Ovidius University of Constanța, Faculty of Mathematics and Computer Science epetac@univ-ovidius.ro Abstract The ease

More information

Call Admission Control: QoS Issue for VoIP

Call Admission Control: QoS Issue for VoIP Call Admission Control: QoS Issue for VoIP Mohammad Asadul Hoque Database Administrator, IT Division TM International Bangladesh Limited (AKTEL) Dhaka, Bangladesh asad1752@ieee.org Farhana Afroz Department

More information

The Comparative Analysis of RED, GF-RED and MGF-RED for Congestion Avoidance in MANETs

The Comparative Analysis of RED, GF-RED and MGF-RED for Congestion Avoidance in MANETs I J C T A, 9(41), 2016, pp. 157-164 International Science Press ISSN: 0974-5572 The Comparative Analysis of RED, GF-RED and MGF-RED for Congestion Avoidance in MANETs Makul Mahajan 1 and Mritunjay Kumar

More information

Traffic Management and QOE in MPLS Network based on Fuzzy Goal Programming

Traffic Management and QOE in MPLS Network based on Fuzzy Goal Programming Traffic Management and QOE in MPLS Network based on Fuzzy Goal Programming Satya Prakash Rout 1 Head, Department of Electronics and Communication Engineering, Temple City Institute of Technology and Engineering,

More information

Lecture 13. Quality of Service II CM0256

Lecture 13. Quality of Service II CM0256 Lecture 13 Quality of Service II CM0256 Types of QoS Best Effort Services Integrated Services -- resource reservation network resources are assigned according to the application QoS request and subject

More information

Billing Schemes Evaluation for Different Network Scenarios

Billing Schemes Evaluation for Different Network Scenarios Billing Schemes Evaluation for Different Network Scenarios H. Abdalla Jr 1, A. Martins 1, P. Carvalho 1 G. Amvame-Nze 2, P. Solís Barreto 2, V. Macedo 2, C. Vianna 2, J. Sombra 2 Labcom-Faculty of Technology,,

More information

Inspirations from Multiple Race Track Athletics for Multimedia Communications Traffic Engineering: Opportunities and Challenges

Inspirations from Multiple Race Track Athletics for Multimedia Communications Traffic Engineering: Opportunities and Challenges Inspirations from Multiple Race Track Athletics for Multimedia Communications Traffic Engineering: Opportunities and Challenges Sudip Misra Yale University Model M racers running towards a goal. Non-interfering

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

سوي يچينگ و مسيريابي در شبكه

سوي يچينگ و مسيريابي در شبكه سوي يچينگ و مسيريابي در شبكه دكتر فرهاد فغاني استاديار دانشكده مهندسي برق قسمت ششم : Multi-Protocol Label Switching (MPLS) 1 One of the many ways of getting from A to B: BROADCAST: Go everywhere, stop

More information

Enhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network

Enhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network 91 Enhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network Amit Kumar Garg and R S Kaler School of Electronics and Communication Eng, Shri Mata Vaishno Devi University (J&K),

More information

Trafffic Engineering 2015/16 1

Trafffic Engineering 2015/16 1 Traffic Engineering 2015/2016 Traffic Engineering: from ATM to MPLS fernando.silva@tecnico.ulisboa.pt Instituto Superior Técnico Trafffic Engineering 2015/16 1 Outline Traffic Engineering revisited Traffic

More information

WiMax-based Handovers in Next Generation Networks

WiMax-based Handovers in Next Generation Networks WiMax-based Handovers in Next Generation Networks Nadine Akkari Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University, Saudi Arabia nakkari@kau.edu.sa

More information

G BAM: A Generalized Bandwidth Allocation Model for IP/MPLS/DS-TE Networks

G BAM: A Generalized Bandwidth Allocation Model for IP/MPLS/DS-TE Networks International Journal of Computer Information Systems and Industrial Management Applications. ISSN 2150-7988 Volume 6 (2014) pp. 635-643 MIR Labs, www.mirlabs.net/ijcisim/index.html G BAM: A Generalized

More information

Multi Protocol Label Switching (an introduction) Karst Koymans. Thursday, March 12, 2015

Multi Protocol Label Switching (an introduction) Karst Koymans. Thursday, March 12, 2015 .. MPLS Multi Protocol Label Switching (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 4.3, 2015/03/09 13:07:57) Thursday, March 12, 2015 Karst Koymans (UvA) MPLS

More information

Configuring Quality of Service for MPLS Traffic

Configuring Quality of Service for MPLS Traffic CHAPTER 20 Multiprotocol label switching (MPLS) combines the performance and capabilities of Layer 2 (data link layer) switching with the proven scalability of Layer 3 (network layer) routing. MPLS enables

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

Efficient path protection using Bi-directional WDM transmission technology. Title

Efficient path protection using Bi-directional WDM transmission technology. Title Title Efficient path protection using Bi-directional WDM transmission technology Author(s) Li, J; Yeung, KL Citation Globecom - Ieee Global Telecommunications Conference, 2005, v. 4, p. 1910-1914 Issued

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have

More information

Asynchronous Networks and Erlang Formulas

Asynchronous Networks and Erlang Formulas 85 International Journal of Communication etworks and Information Security (IJCIS) Vol. 2, o. 2, ugust 21 synchronous etworks and Erlang Formulas Erik Chromý, Matej Kavacký Dept. of Telecommunications,

More information

Modular Quality of Service Overview on Cisco IOS XR Software

Modular Quality of Service Overview on Cisco IOS XR Software Modular Quality of Service Overview on Cisco IOS XR Software Quality of Service (QoS) is the technique of prioritizing traffic flows and providing preferential forwarding for higher-priority packets. The

More information

CS High Speed Networks. Dr.G.A.Sathish Kumar Professor EC

CS High Speed Networks. Dr.G.A.Sathish Kumar Professor EC CS2060 - High Speed Networks Dr.G.A.Sathish Kumar Professor EC UNIT V PROTOCOLS FOR QOS SUPPORT UNIT V PROTOCOLS FOR QOS SUPPORT RSVP Goals & Characteristics RSVP operations, Protocol Mechanisms Multi

More information

Multi-metrics based Congestion Control protocol in Wireless Sensor Network

Multi-metrics based Congestion Control protocol in Wireless Sensor Network e-issn 2455 1392 Volume 2 Issue 5, May 2016 pp. 536 543 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Multi-metrics based Congestion Control protocol in Wireless Sensor Network Sushma

More information

Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures

Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures Journal of Computer Science 5 (12): 1042-1047, 2009 ISSN 1549-3636 2009 Science Publications Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

A Fuzzy System for Adaptive Network Routing

A Fuzzy System for Adaptive Network Routing A Fuzzy System for Adaptive Network Routing A. Pasupuleti *, A.V. Mathew*, N. Shenoy** and S. A. Dianat* Rochester Institute of Technology Rochester, NY 14623, USA E-mail: axp1014@rit.edu Abstract In this

More information

Performance of Optical Burst Switching Techniques in Multi-Hop Networks

Performance of Optical Burst Switching Techniques in Multi-Hop Networks Performance of Optical Switching Techniques in Multi-Hop Networks Byung-Chul Kim *, You-Ze Cho *, Jong-Hyup Lee **, Young-Soo Choi **, and oug Montgomery * * National Institute of Standards and Technology,

More information

Adaptive Data Burst Assembly in OBS Networks

Adaptive Data Burst Assembly in OBS Networks Adaptive Data Burst Assembly in OBS Networks Mohamed A.Dawood 1, Mohamed Mahmoud 1, Moustafa H.Aly 1,2 1 Arab Academy for Science, Technology and Maritime Transport, Alexandria, Egypt 2 OSA Member muhamed.dawood@aast.edu,

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Zhili Zhao Dept. of Elec. Engg., 214 Zachry College Station, TX 77843-3128 A. L. Narasimha Reddy

More information

A Bandwidth-Broker Based Inter-Domain SLA Negotiation

A Bandwidth-Broker Based Inter-Domain SLA Negotiation A Bandwidth-Broker Based Inter-Domain SLA Negotiation Haci A. Mantar θ, Ibrahim T. Okumus, Junseok Hwang +, Steve Chapin β θ Department of Computer Engineering, Gebze Institute of Technology, Turkey β

More information

Quality of Service II

Quality of Service II Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated

More information